About Me

  • About curtisy
    Service provider
    Germany - 1&1
    Home country
    Software dev and hobbyist hacker
    Software Developer
    Paypal Donation Email
    [email protected]
  • Devices
    ZTE Nubia Z18


Total Posts
General Information
  • Last Activity: 29th October 2020 09:25 PM
  • Last Login: 1st January 1970 12:00 AM
  • Join Date: 20th December 2016
  • Referrals: 0

Most Thanked

Post Summary
Weekly log #3 I know why it's a system app now :p it's using system permissions so I had to manually map most of the information like IMEI or product ID for now. Luckily so far there is only one thing I need to brute-force and that's a number (mea...
Short update again :) I implemented a small debug app over the last few days to see if I could decrypt the key used for communicating with OPPO API. Since OPPO's server always returns a valid response even when the key is definitely invalid (see t...
Short update: I started reversing the apk some more but I'm not yet sure what's going on when. The only thing I'm quite sure of is that the app receives some kind of "unlock code" from Oppo's servers (OnePlus apparently did/does the same) and base...
Happy if I can be of help :) I did some further digging and found out a few more things: The string seems to be the public key to the verified boot signing key which means it won't be easy to find out, especially since it's not guaranteed to be t...
Yes and no. I can't tell what would happen but you could definitely try. Although I doubt that's their only protection mechanism but you never know until you try ;) I'll first focus on getting the key header that's needed to get valid non-null re...